FEATURES

ALTERNATIVES

A continuous threat exposure management platform that provides automated vulnerability scanning for internet-facing assets with varying service tiers for different organizational needs.

Automates SQL injection detection and exploitation

A framework for building code injection vulnerability testbeds

A comprehensive database of exploits and vulnerabilities for researchers and professionals

DOM-based XSS vulnerability scanner

kube-hunter hunts for security weaknesses in Kubernetes clusters.

A wargame composed of 27 levels, with files needed in /vortex/ directory.

A Docker analysis tool for identifying potential security vulnerabilities and weaknesses in Docker environments

PINNED